<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with NAT/Route issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540662#M609523</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You asked for a single IP to NAT to.&amp;nbsp;&amp;nbsp; Why not use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.1.1.71 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Oct 2010 15:25:21 GMT</pubDate>
    <dc:creator>patl.mente</dc:creator>
    <dc:date>2010-10-08T15:25:21Z</dc:date>
    <item>
      <title>Help with NAT/Route issues</title>
      <link>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540659#M609520</link>
      <description>&lt;P&gt;Ok, so we were able to get up and running getting out to the network, and to our DMZ.&amp;nbsp; But on live testing, we found that our DMZ can't get back to the inside, and it appears that outside can't get into our web server. &lt;/P&gt;&lt;P&gt;We are using the dynamic NATs that were suggested to solve our original problem, but it seems like they may not allow traffic to flow the other way?&amp;nbsp; I'll confess that I am a little confused on the whole NAT logic.&amp;nbsp;&amp;nbsp; Each time I think I'm understanding it, something like this crops up and I'm lost again!&amp;nbsp; (same thing with static routes, actually)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, we want to be able to go from inside to outside, from outside to inside (web server specific), inside to DMZ and DMZ to inside.&amp;nbsp; What is the best way to allow that to happen?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is our config:&amp;nbsp; (the access lists are pretty wide atm, since at first we believed the problem to be that, but now I think it's NAT/Route, please correct me if this is wrong!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list INSIDE_access_in extended permit tcp any any eq www inactive &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES any any &lt;BR /&gt;access-list INSIDE_access_in extended permit udp any any eq domain &lt;BR /&gt;access-list INSIDE_access_in remark ALLOWS ANY INTERNAL HOST TO CONNECT TO INTERNET&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group WebServicePlus 192.168.204.0 255.255.255.0 any &lt;BR /&gt;access-list INSIDE_access_in remark ALLOW ADMINS TO PING, TRACEROUTE, ETC.&amp;nbsp; TO ANY DESTINATION.&lt;BR /&gt;access-list INSIDE_access_in extended permit icmp object-group Admins any &lt;BR /&gt;access-list INSIDE_access_in remark ALLOW INSIDE HOSTS TO ACCESS TRD - HELPSTAR USING SEVERAL SERVICES.&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group HELPSTARGROUP 192.168.204.0 255.255.255.0 object HELPSTAR &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES object-group Admins interface management &lt;BR /&gt;access-list INSIDE_access_in remark test rule for web connectivity.&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group WebServicePlus 192.168.2.0 255.255.255.0 any &lt;BR /&gt;access-list INSIDE_access_in remark ALLOWS SMTP OUT&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group MailServices object obj-192.168.204.0 any &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES any 172.20.204.0 255.255.255.0 &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES any interface DMZ &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group DMZSQLSERVICES 192.168.204.0 255.255.255.0 172.20.204.0 255.255.255.0 &lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit object-group HTTPHTTPS 10.0.204.0 255.255.255.0 any &lt;BR /&gt;access-list OUTSIDE_access_in_1 remark ALLOW SLO HOSTS TO ACCESS XWD FOR TESTING&lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit object-group HTTPHTTPS object-group SLO object ONGARDWD &lt;BR /&gt;access-list OUTSIDE_access_in_1 remark ALLOW ACCESS FROM EXTERNAL IP ADDRESS TO INTERNAL IP ADDRESS ON XW&lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit tcp object X object O-NIC2 eq www &lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit icmp host 10.0.7.1 any &lt;BR /&gt;access-list OUTSIDE_access_in remark ALLOW SLO TESTERS TO COMMUNICATE WITH X.&lt;BR /&gt;access-list OUTSIDE_access_in remark ALLOW SLO TESTERS TO COMMUNICATE WITH X&lt;BR /&gt;access-list OUTSIDE_access_in extended permit object-group HTTPHTTPS 10.0.204.64 255.255.255.192 host 192.168.204.55 &lt;BR /&gt;access-list DMZ_access_in remark ALLOWS INTERNAL HOSTS TO CONNECT TO MAINFRAME&lt;BR /&gt;access-list DMZ_access_in extended permit object-group MainframeServices 192.168.204.0 255.255.255.0 any &lt;BR /&gt;access-list DMZ_access_in remark ALLOW INTERNAL HOSTS TO CONNECT TO DMZ/PERIMETER&lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES 192.168.204.0 255.255.255.0 172.20.204.0 255.255.255.192 &lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES object-group DMZCOMPUTERS any &lt;BR /&gt;access-list DMZ_access_in remark ALLOW DMZ COMPUTERS TO TALK TO INTERNAL&lt;BR /&gt;access-list DMZ_access_in extended permit object-group INTERNALSERVICES object-group DMZCOMPUTERS 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in remark ALLOWS DMZ SQL SERVERS TO TALK TO INSIDE HOSTS&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DMZSQLSERVICES object-group DMZSQLSERVERS 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in remark ALLOWS ALL DMZ SERVERS TO BE BACKED UP VIA XBK.&lt;BR /&gt;access-list DMZ_access_in extended permit object-group BACKUPEXEC object DMZNETWORK 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in remark ALLOW PINGBACK FROM DMZ&lt;BR /&gt;access-list DMZ_access_in extended permit icmp object 172.20.204.0 any &lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES 172.20.204.0 255.255.255.0 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in extended permit object-group DMZSQLSERVICES 172.20.204.0 255.255.255.0 object ONGARDW &lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES host 172.20.204.41 object XW-NIC2 &lt;BR /&gt;access-list INSIDE_nat0_outbound extended permit ip any 192.168.204.240 255.255.255.240 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging class auth console errors &lt;BR /&gt;logging class sys console errors &lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPBNIPPOOL 192.168.204.240-192.168.204.250 mask 255.255.255.0&lt;BR /&gt;ip local pool VPNTESTPOOL 192.168.2.100-192.168.2.114 mask 255.255.255.240&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface HEARTBEAT Ethernet0/3&lt;BR /&gt;failover link HEARTBEAT Ethernet0/3&lt;BR /&gt;failover interface ip HEARTBEAT 10.1.1.1 255.255.255.0 standby 10.1.1.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any OUTSIDE&lt;BR /&gt;icmp permit any INSIDE&lt;BR /&gt;icmp permit any management&lt;BR /&gt;asdm image disk0:/asdm-634.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static any any destination static OBJ-VPBNIPPOOL OBJ-VPBNIPPOOL&lt;BR /&gt;nat (OUTSIDE,INSIDE) source static X.X.X.destination static ON-NIC2 description TRANSLATE INCOMING EXTERNAL IP ADDRESS TO INTERNAL IP ADDRESS &lt;BR /&gt;nat (INSIDE,OUTSIDE) source dynamic 192.168.2.0 interface&lt;BR /&gt;!&lt;BR /&gt;object network OBJ-192.168.204.0&lt;BR /&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;object network TESTOBJ-192.168.204.0&lt;BR /&gt; nat (INSIDE,DMZ) dynamic interface&lt;BR /&gt;access-group OUTSIDE_access_in_1 in interface OUTSIDE&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.0.204.65 1&lt;BR /&gt;route DMZ 192.168.204.84 255.255.255.255 192.168.204.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.1.2 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540659#M609520</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2019-03-11T18:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT/Route issues</title>
      <link>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540660#M609521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please share the following:&lt;/P&gt;&lt;P&gt;1) What is your inside subnet?&lt;/P&gt;&lt;P&gt;2) What is your DMZ subnet?&lt;/P&gt;&lt;P&gt;3) What public IP Address you would like to NAT your DMZ web server to so it can be accessible from the outside/internet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Oct 2010 03:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540660#M609521</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-10-08T03:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT/Route issues</title>
      <link>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540661#M609522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I work with Heather, and she's off this morning.&amp;nbsp;&amp;nbsp; But here is what I can tell you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside subnet is:&amp;nbsp;&amp;nbsp; 192.168.204.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ Subnet is:&amp;nbsp;&amp;nbsp; 172.20.204.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, but the external IP address is confidential.&amp;nbsp;&amp;nbsp; We are not allowed to release it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why not just use:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.0/24 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Oct 2010 15:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540661#M609522</guid>
      <dc:creator>patl.mente</dc:creator>
      <dc:date>2010-10-08T15:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT/Route issues</title>
      <link>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540662#M609523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You asked for a single IP to NAT to.&amp;nbsp;&amp;nbsp; Why not use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.1.1.71 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Oct 2010 15:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-nat-route-issues/m-p/1540662#M609523</guid>
      <dc:creator>patl.mente</dc:creator>
      <dc:date>2010-10-08T15:25:21Z</dc:date>
    </item>
  </channel>
</rss>

